| Index: net/quic/crypto/quic_crypto_server_config.cc
|
| diff --git a/net/quic/crypto/quic_crypto_server_config.cc b/net/quic/crypto/quic_crypto_server_config.cc
|
| index c7b83bfb9b1305049f9f2cc1abe1c2b6d8702ba8..fc17b739309fd974adb8f7002d34a175de701f08 100644
|
| --- a/net/quic/crypto/quic_crypto_server_config.cc
|
| +++ b/net/quic/crypto/quic_crypto_server_config.cc
|
| @@ -1090,8 +1090,8 @@ void QuicCryptoServerConfig::EvaluateClientHello(
|
| // Server nonce is optional, and used for key derivation if present.
|
| client_hello.GetStringPiece(kServerNonceTag, &info->server_nonce);
|
|
|
| - if (version > QUIC_VERSION_26) {
|
| - DVLOG(1) << "No 0-RTT replay protection in QUIC_VERSION_27 and higher.";
|
| + if (version > QUIC_VERSION_30) {
|
| + DVLOG(1) << "No 0-RTT replay protection in QUIC_VERSION_31 and higher.";
|
| // If the server nonce is empty and we're requiring handshake confirmation
|
| // for DoS reasons then we must reject the CHLO.
|
| if (FLAGS_quic_require_handshake_confirmation &&
|
|
|